Search Results - (( intelligence system from algorithm ) OR ( intelligent system growth algorithm ))
Search alternatives:
- intelligence system »
- growth algorithm »
- from algorithm »
-
1
Immune Multiagent System for Network Intrusion Detection using Non-linear Classification Algorithm
Published 2010“…The growth of intelligent intrusion and diverse attack techniques in network systems stimulate computer scientists and mathematical researchers to challenge the dangers of intelligent attacks. …”
Get full text
Get full text
Get full text
Citation Index Journal -
2
A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali
Published 2015“…Swarm intelligence is a modern artificial intelligence discipline that is concerned with the design and optimization of multiagent systems with applications in robotics. …”
Get full text
Get full text
Thesis -
3
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…The wrapper feature selection mode can be used in different application areas of expert and intelligent systems and this is confirmed from the obtained results over different types of datasets. © 2019 Elsevier Ltd…”
Get full text
Get full text
Article -
4
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
Get full text
Get full text
Thesis -
5
Clustering autism spectrum disorder student’s system based on intelligence, skills and behavior using agglomerative clustering algortihm / Daarin Nadia Nordin
Published 2020“…Thus, this project proposes a solution to the problems by utilizing the machine learning approach which is the Agglomerative clustering algorithm. Previous studies shows that homogenous grouping of autistics students yields positive results, therefore, this project proposes to design and develop a clustering model system known as the CASDSS (Clustering Autism Spectrum Disorder Students System) where the main goal of this system is to create a homogenous grouping of the ASD students based on their behaviour, skills and intelligence. …”
Get full text
Get full text
Thesis -
6
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
Published 2011“…There has been a rapid growth in using Artificial Immune Systems for applications in data mining and computational intelligence recently. …”
Get full text
Get full text
Thesis -
7
Automated scheduling of hostel room allocation using genetic algorithm
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
8
ELP-M2: An Efficient Model for Mining Least Patterns from Data Repository
Published 2017Get full text
Get full text
Get full text
Get full text
Book Chapter -
9
-
10
-
11
Machine learning and deep learning approaches for cybersecurity: a review
Published 2022“…This paper reviewed intrusion detection systems and discussed what types of learning algorithms machine learning and deep learning are using to protect data from malicious behavior. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Embracing AI in travel and tourism industry / Ranee Atlas, Tina Stephen Enggong and Saifulrizan Norizan
Published 2023“…AI is defined as the simulation human intelligence processed by machines, particularly computer systems. …”
Get full text
Get full text
Article -
13
Review of data fusion methods for real-time and multi-sensor traffic flow analysis
Published 2023Review -
14
A Hybrid Soft Computing Framework for Electrical Energy Optimization
Published 2021“…In the recent literature, many artificial intelligence algorithms have been proposed to cater to the need for efficient and real-time decision-making. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Online PID controller tuning using tree physiology optimization
Published 2017Get full text
Get full text
Article -
16
-
17
Characterizing Current Features of Malicious Threats on Websites
Published 2019Get full text
Get full text
Conference or Workshop Item -
18
-
19
Case driven TLC model checker analysis in energy scenario
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Deep learning in distributed denial-ofservice attacks detection method for Internet of Things networks
Published 2023“…With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. …”
Get full text
Get full text
Get full text
Article
